[ 
https://issues.apache.org/jira/browse/OAK-6356?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16053953#comment-16053953
 ] 

Alex Deparvu commented on OAK-6356:
-----------------------------------

[~anchela] started work on this branch [0] please take a look!

* I have added OR variants to existing tests that cover the composite package.
* Not sure how to enable the OR version via config, would appreciate a hand here
* found 2 interesting items in the {{CompositeTreePermission}}, but those are 
not relevant to this patch, at least I don't think they are: {{canReadAll}} 
always returns false and second is {{canReadProperties}} does not seem to use a 
composite aggregation of existing treePermissions.
* had to locally bump a few OSGi export versions, not exactly sure why 
(probably unrelated to the patch)


[0] https://github.com/apache/jackrabbit-oak/compare/trunk...stillalex:oak-6356

> Allow CompositePermissionProvider to OR entries
> -----------------------------------------------
>
>                 Key: OAK-6356
>                 URL: https://issues.apache.org/jira/browse/OAK-6356
>             Project: Jackrabbit Oak
>          Issue Type: Improvement
>          Components: core, security
>            Reporter: Alex Deparvu
>            Assignee: Alex Deparvu
>
> Currently the {{CompositePermissionProvider}} ANDs the entries and if any of 
> those denies a check, all the chain will fail early. I'd like to extend this 
> mechanism to 'OR' items if needed.
> A first application of this ORing could be the multiplexed permission store 
> where the default store could deny a check but a mount could allow it, so it 
> could be seen as valid.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to